Movatterモバイル変換


[0]ホーム

URL:


US7010696B1 - Method and apparatus for predicting the incidence of a virus - Google Patents

Method and apparatus for predicting the incidence of a virus
Download PDF

Info

Publication number
US7010696B1
US7010696B1US09/916,969US91696901AUS7010696B1US 7010696 B1US7010696 B1US 7010696B1US 91696901 AUS91696901 AUS 91696901AUS 7010696 B1US7010696 B1US 7010696B1
Authority
US
United States
Prior art keywords
virus
computer
previous
alert
computer system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime, expires
Application number
US09/916,969
Inventor
Rodney D. Cambridge
Fearuz Ali
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
JPMorgan Chase Bank NA
Original Assignee
McAfee LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by McAfee LLCfiledCriticalMcAfee LLC
Priority to US09/916,969priorityCriticalpatent/US7010696B1/en
Assigned to NETWORKS ASSOCIATES TECHNOLOGY, INC.reassignmentNETWORKS ASSOCIATES TECHNOLOGY, INC.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: ALI, FEARUZ, CAMBRIDGE, RODNEY D.
Priority to US11/095,248prioritypatent/US7409720B1/en
Priority to US11/149,895prioritypatent/US7865956B1/en
Assigned to MCAFEE, INC.reassignmentMCAFEE, INC.MERGER (SEE DOCUMENT FOR DETAILS).Assignors: NETWORKS ASSOCIATES TECHNOLOGY, INC.
Application grantedgrantedCritical
Publication of US7010696B1publicationCriticalpatent/US7010696B1/en
Assigned to MCAFEE, LLCreassignmentMCAFEE, LLCCHANGE OF NAME AND ENTITY CONVERSIONAssignors: MCAFEE, INC.
Assigned to MORGAN STANLEY SENIOR FUNDING, INC.reassignmentMORGAN STANLEY SENIOR FUNDING, INC.SECURITY INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: MCAFEE, LLC
Assigned to JPMORGAN CHASE BANK, N.A.reassignmentJPMORGAN CHASE BANK, N.A.SECURITY INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: MCAFEE, LLC
Assigned to JPMORGAN CHASE BANK, N.A.reassignmentJPMORGAN CHASE BANK, N.A.CORRECTIVE ASSIGNMENT TO CORRECT THE REMOVE PATENT 6336186 PREVIOUSLY RECORDED ON REEL 045055 FRAME 786. ASSIGNOR(S) HEREBY CONFIRMS THE SECURITY INTEREST.Assignors: MCAFEE, LLC
Assigned to MORGAN STANLEY SENIOR FUNDING, INC.reassignmentMORGAN STANLEY SENIOR FUNDING, INC.CORRECTIVE ASSIGNMENT TO CORRECT THE REMOVE PATENT 6336186 PREVIOUSLY RECORDED ON REEL 045056 FRAME 0676. ASSIGNOR(S) HEREBY CONFIRMS THE SECURITY INTEREST.Assignors: MCAFEE, LLC
Assigned to MCAFEE, LLCreassignmentMCAFEE, LLCRELEASE OF INTELLECTUAL PROPERTY COLLATERAL - REEL/FRAME 045055/0786Assignors: JPMORGAN CHASE BANK, N.A., AS COLLATERAL AGENT
Assigned to MCAFEE, LLCreassignmentMCAFEE, LLCRELEASE OF INTELLECTUAL PROPERTY COLLATERAL - REEL/FRAME 045056/0676Assignors: MORGAN STANLEY SENIOR FUNDING, INC., AS COLLATERAL AGENT
Assigned to JPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENT AND COLLATERAL AGENTreassignmentJPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENT AND COLLATERAL AGENTSECURITY INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: MCAFEE, LLC
Assigned to JPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENTreassignmentJPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENTCORRECTIVE ASSIGNMENT TO CORRECT THE THE PATENT TITLES AND REMOVE DUPLICATES IN THE SCHEDULE PREVIOUSLY RECORDED AT REEL: 059354 FRAME: 0335. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNMENT.Assignors: MCAFEE, LLC
Adjusted expirationlegal-statusCritical
Expired - Lifetimelegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

Methods and apparatus for predicting the incidence of a new virus a within a system based upon previous infections recorded within the system. According to one aspect of the present invention, a method for responding to a virus alert that provides information pertaining to a new virus includes obtaining the virus alert and assessing a risk level associated with the new virus. The risk level indicates the predicted likelihood that the first virus will cause significant damage in the event that the new virus infects the computer system. Finally, the method includes obtaining computer code such as a driver and/or a dat when the risk level indicates that the new virus may pose a significant risk to the computer system.

Description

CROSS REFERENCE TO RELATED APPLICATION
The present invention claims priority under 35 U.S.C. 119 of U.S. Provisional Patent Application No. 60/280,594, filed Mar. 30, 2001, which is incorporated herein by reference in its entirety.
BACKGROUND OF THE INVENTION
1. Field of Invention
The present invention relates generally to virus protection systems. More particularly, the present invention relates to a virus incidence predictor that enables the susceptibility of an organization to new viruses to be assessed.
2. Description of the Related Art
As the use of networked computing systems increases, the risk of propagating viruses though networks also increases. While some viruses cause relatively minor problems within a computing system, many viruses may cause serious and even irreparable harm. As new viruses are being announced and identified daily, preparing computing systems to combat the viruses and to neutralize the effect of the viruses is essential in maintaining the integrity of the network.
Drivers and/or dats which provide software that may prevent an infection or combat an existing infection are generally created to operate with anti-virus software on a system to neutralize the effect of a virus on the system. Typically, drivers and/or dats are created to effectively combat certain viruses. That is, once a virus is announced, drivers and/or dats which are intended to serve as fixes or patches for the virus are developed. Once developed, the drivers and/or dats may then be provided to anti-virus software on a system to neutralize the effect of the virus on the system.
FIG. 1ais a process flow diagram which illustrates the steps associated with a method of combating viruses. Aprocess100 begins atstep102 in which a system, e.g., a computing system, operates. During the operation of the system, a determination is made instep104 as to whether a virus has been detected within the system. In other words, it is determined if a virus has breached the security of the system. If it is determined that a virus is detected within the system, then drivers and/or dats are downloaded and applied from an anti-virus website insteps106 and108. If it is determined that a virus is not detected within the system, then a determination is made instep110 as to whether a specified time length has elapsed. The specified time length is a duration of time which passes before drivers and/or dats on the system are updated. e.g., by downloading current drivers and/or dats onto the system.
If it is determined that the specified time length has not elapsed, then the system continues to operate atstep102. Alternatively, if it is determined that the specified time length has elapsed, then drivers and/or dats are downloaded and applied from an anti-virus website insteps112 and114. Typically, all new and updated drivers and/or dats are downloaded. Once the drivers and/or dats are downloaded, the downloaded drivers and/or dats are applied, e.g., by anti-virus software that is local to the system, the system continues to operate atstep102.
Returning tostep104 and the determination of whether a virus is detected within the system, if it is determined that no virus has been detected within the system, process flow proceeds tostep110 in which it is determined whether a specified time length has elapsed. That is, since drivers and/or dats are periodically downloaded onto the system, it is determined instep110 whether it is time for another download to occur.
As shown inFIG. 1b, local anti-virus oranti-viral software130 which is suitable for downloading and applying drivers and/or dats is often included in asystem134. Localanti-viral software130 accesses drivers and/or dats138 which are external tosystem134 to download drivers and/or dats138. As discussed above, drivers and/or dats138 may be downloaded periodically by localanti-viral software130. Alternatively, drivers and/or dats138 may be downloaded when a virus is detected withinsystem134.
In order to prevent viruses from penetrating a system, a network administrator may choose to download drivers and/or dats relatively often. Such downloading may be performed by reducing the time intervals between consecutive scheduled downloads to enable downloads to be performed more often. By downloading drivers and/or dats more often, the likelihood that a new virus may affect the system before an appropriate driver and/or dat is obtained may be reduced. However, frequently downloading substantially all new or updated drivers and/or dats, and implementing the new or updated drivers and/or dats, may be inefficient.
Anti-virus companies or organizations, through the use of electronic mail and websites, may provide warnings pertaining to new viruses. A system or network administrator may generally monitor the warnings to ascertain which viruses pose significant threats to the system he administers. With the large amount of viruses currently being developed, ascertaining which virus threats to take seriously and which virus threats may effectively be ignored for the time being may be a nearly impossible task for the network administrator. Reacting to virus threats substantially immediately after the virus threats are announced may be time-consuming and, hence, inefficient especially if the viruses fail to seriously threaten the system. However, failing to react to the virus threats substantially immediately after the virus threats are announced may result in a virus infecting the system before appropriate dats and/or drivers are applied.
Relying substantially on only information provided in virus alerts to assess the risk posed by viruses may not be sufficient, as some viruses characterized as being relatively “minor” may actually cause significant problems in specific types of networks. That is, a virus that may pose only a minor threat to one system may pose a substantial threat to another system.
Therefore, what is needed is an efficient method and apparatus for assessing the risk of a virus to a particular system. That is, what is desired is a method and an apparatus that analyzes the types of infections that a system or organization has had in the past, and warns a network administrator of new viruses which are similar to viruses that have previously caused significant infections within the system.
SUMMARY OF THE INVENTION
The present invention relates to predicting the incidence of a new virus a within a system based upon previous infections recorded within the system. According to one aspect of the present invention, a method for responding to a virus alert that provides information pertaining to a new virus includes obtaining the virus alert and assessing a risk level associated with the new virus. The risk level indicates the predicted likelihood that the first virus will cause significant damage in the event that the new virus infects the computer system. Finally, the method includes obtaining computer code, e.g., a driver and/or a dat, when the risk level indicates that the new virus may pose a significant risk to the computer system.
In one embodiment, assessing the risk level associated with the new virus includes obtaining information associated with a previous virus which has previously caused an infection on the computer system, and comparing the information pertaining to the new virus with the information associated with the previous virus. In such an embodiment, the previous virus and the new virus are of a first type, and the information associated with the previous virus includes data associated with a duration of the infection and a scope of the infection.
A virus incidence predictor which substantially automatically identifies trends of virus infections within a system or an organization builds up a profile of types of viruses that the organization is susceptible to. Once a profile is created, when a new virus matches a stored profile, an appropriate action may be taken to protect the organization against the new virus. For example, a driver designed to combat the new virus may be downloaded and applied within the organization. Such a virus incidence predictor enables relatively intelligent decisions to be made regarding which virus threats are to be treated as being serious, and which virus threats may be treated as being less serious.
According to another aspect of the present invention, a method for predicting the incidence of a virus in a computer system includes obtaining information relating to a new virus that has not yet been detected on the computer system. The method also includes obtaining information relating to a plurality of viruses which have previously infected the computer system, and comparing the information relating to the new virus to the information relating to the viruses which have previously infected the computer system. Comparing the information relating to the new virus to the information relating to the viruses which have previously infected the computer system includes determining a risk level associated with the new virus based on the information relating to the viruses which have previously infected the computer system. The risk level indicates a risk posed by the new virus to the computer system. In one embodiment, the information relating to the new virus is obtained from an anti-virus website.
In another embodiment, comparing the information relating to the new virus to the information relating to the plurality of viruses which have previously infected the computer system includes determining a virus type associated with the new virus and identifying at least a first previous virus which has previously infected the computer system and is of the virus type associated with the new virus. In such an embodiment, comparing the information relating to the new virus to the information relating to the viruses which have previously infected the computer system further includes determining when an infection caused by the first previous virus was prolonged, and determining when the infection caused by the first previous virus was widespread.
According to still another aspect of the present invention, a method for protecting a computer system against a first virus includes executing an anti-virus application on the computer system, as well as executing a virus incidence prediction application on the computer system. The virus incidence prediction application is configured to compare information relating to the first virus to information relating to viruses which have previously infected the computer system to determine a risk level of infection associated with the first virus. The risk level of infection indicates a risk posed by the current virus to the computer system, wherein the virus incidence prediction application executes in parallel with the anti-virus application. In one embodiment, executing the virus incidence prediction application includes obtaining the information relating to the first virus, and obtaining the information relating to the viruses that have previously infected the computer system, which may be a network that includes multiple computing devices.
These and other advantages of the present invention will become apparent upon reading the following detailed descriptions and studying the various figures of the drawings.
BRIEF DESCRIPTION OF THE DRAWINGS
The invention may best be understood by reference to the following description taken in conjunction with the accompanying drawings in which:
FIG. 1ais a process flow diagram which illustrates the steps associated with a conventional method of combating a virus in a computer system.
FIG. 1bis a schematic of a system which includes anti-viral software.
FIG. 2 is a schematic of a system which includes anti-viral software and a virus incidence predictor in accordance with an embodiment of the present invention.
FIG. 3 is a process flow diagram which illustrates the steps associated with a first method of predicting the incidence of a virus in accordance with an embodiment of the present invention.
FIG. 4 is a process flow diagram which illustrates the steps associated with ranking a virus in accordance with an embodiment of the present invention.
FIG. 5 is a process flow diagram which illustrates the steps associated with characterizing a virus which has been detected within a system in accordance with an embodiment of the present invention.
FIG. 6 is a process flow diagram which illustrates the steps associated with a second method of predicting the incidence of a virus in accordance with another embodiment of the present invention.
FIG. 7 is a schematic of a networked organization which includes a virus incidence predictor in accordance with an embodiment of the present invention.
FIG. 8 is a block diagram of a computing device which is suitable for implementing the present invention.
DETAILED DESCRIPTION OF THE EMBODIMENTS
Ascertaining which virus threats are to be taken seriously and which virus threats may effectively be ignored in the short term may be a nearly impossible task for a network administrator, given the volume of new viruses that are being developed. Reacting to all virus threats substantially immediately after the virus threats are announced often proves to be inefficient. On the other hand, failing to react to the virus threats substantially immediately may result in a virus infecting a system. While a network administrator may choose to react to virus alerts associated with viruses which are believed to pose great threats to systems in general, the network administrator may need to react substantially immediately to viruses that are believed to pose lesser threats, as such viruses may be particularly damaging to the system administered by the network administrator. In general, it is difficult for the network administrator to determine which of the viruses that are believed to pose lesser threats to respond to.
Recording information pertaining to viruses which have previously infected a system, i.e., tracking and trending viruses which have previously infected a system, then comparing a new virus described in a virus alert against the recorded information allows the risk of the new virus to be assessed with respect to the system. A system which includes a virus incidence predictor generally enables viruses which are likely to pose a threat within the system to effectively be predicted and, hence, enables a network administrator to adequately prepare to combat the virus. By identifying viruses which the system is susceptible to based upon viruses which have previously infected the system, a network administrator may predict which viruses the system is likely to encounter.
If a comparison of the new virus to previous viruses within the system results in a low predicted likelihood that the new virus will affect the system, then it may not be necessary to substantially immediately deal with the new virus, e.g., by substantially immediately obtaining appropriate drivers and/or dats. Alternatively, if a comparison of the new virus to previous viruses within the system results in a relatively high predicted likelihood that the new virus will significantly affect the system, then a network administrator may react to the threat of the new virus appropriately.
The use of a system which includes both a virus incidence predictor and anti-viral software enables the threat of viruses to be dealt with in an efficient manner. Such a system allows the anti-viral software to periodically download drivers and/or dats from an anti-virus website, while allowing the virus incidence predictor to download specific drivers and/or dats on an as-needed basis based upon the predicted probablility that a given virus will affect the system. Hence, such a system is both effective and efficient in dealing with viruses.
With reference toFIG. 2, a system which includes local anti-viral software and a virus incidence predictor will be described in accordance with an embodiment of the present invention. Asystem180, e.g., a local network, includes local anti-viral oranti-virus software184 and avirus incidence predictor188 which are both in communication with external drivers and/ordats192 which they may each download or otherwise obtain. Localanti-viral software184 downloads drivers and/ordats192 at predetermined intervals, whilevirus incidence predictor188 causes drivers and/ordats192 to be downloaded when it predicts that a particular new virus is likely to be encountered bysystem180. Whenvirus incidence predictor188 causes drivers and/ordats192 to be downloaded,virus incidence predictor188 also generally causes localanti-virus software184 to apply the downloaded drivers and/ordats192.
Predicting the incidence of a virus within a system generally includes monitoring new viruses such that substantially any new virus which may significantly harm the system may be identified in a relatively time-efficient manner.FIG. 3 is a process flow diagram which illustrates the steps associated with a process of predicting the incidence of a virus in accordance with an embodiment of the present invention. A process200 begins atstep202 in which, during the operation of an overall system, a server on which a virus incidence predictor executes periodically polls an anti-virus website to check for newly announced viruses. By way of example, the virus incidence predictor itself may automatically poll an anti-virus website at predetermined time intervals to check for virus definitions which have been produced since the last time the virus incidence predictor polled the anti-virus website. Although the predetermined time intervals may vary, e.g., the time intervals may be adjusted by a network administrator, the time intervals are typically on the order of approximately one day. That is, the anti-viral website that is accessible to the overall system may be polled once a day.
When a new virus, or a virus which has not been detected before, is identified, an anti-virus website generally produces a virus alert. The virus alert includes information associated with the new virus. Such information may include, but is not limited to, a description of the virus, dats associated with the virus, and information relating to the perceived risk associated with the virus.
In addition to periodically polling an anti-virus website or an anti-virus information source, as for example an anti-virus website maintained by Network Associates Technology, Inc., of Santa Clara, Calif. at http://www.NAI.com, an alert manager application (as shown below with respect toFIG. 7) which also executes on the server is periodically checked or polled instep204 to determine if the alert manager application has picked up any alerts. In other words, the alert manager application which monitors alerts is periodically polled, e.g., more than once a day or approximately twice a week, to determine if any alerts have been received by the server since the last time the alert manager application was polled. As will be appreciated by those skilled in the art, a client associated with the server may notify the alert manager application of an alert. When an alert is received by the alert manager application, the indication is that a virus which corresponds to the alert has been detected within the overall system by anti-viral software that is local to the overall system which effectively operates in parallel with the virus incidence predictor. The alert manager application may be an application such as Alert Manager or EPO, available from Network Associates Technology, Inc.
A determination is made instep206 regarding whether an alert or alerts have been picked up by the alert manager application. If it is determined that at least one alert has been identified by the alert manager application, then process flow proceeds to step208 in which the alerts that were picked up are stored in a database. Once the alerts are stored, process flow proceeds to step210 in which a determination is made as to whether a virus alert was located when the anti-virus website was polled. Instep206, if the determination is that no alerts were picked up by the alert manager application, process flow proceeds directly fromstep206 to step210.
If it is determined instep210 that a virus alert was not located when the anti-virus website was polled, then process flow returns to step202 in which the overall system continues to operate, and the anti-virus website is periodically polled to check for newly announced viruses. Alternatively, if it is determined that a virus alert was located, then it is determined instep212 whether the virus alert is a high risk alert. Typically, determining whether the alert is a high risk alert involves reading information in the virus alert that pertains to the perceived risk level of the virus alert. While the factors used in the characterization of a virus as a high risk virus may vary, a virus that is associated with a high risk alert is generally a virus that is observed to have infected a relatively large geographic area in a relatively short period of time. For example, a virus that is characterized as a high risk virus may be a virus that has been seen to spread across North America in less than two days.
When the determination instep212 is that the virus alert is a high risk alert, the indication is that it would be beneficial to prepare the overall system to handle the virus identified by the virus alert. Accordingly, the drivers and/or dats that are suitable for combating the virus are downloaded from the anti-viral website instep214. The downloaded drivers and/or dats may then be applied instep216 by anti-viral software that is local to the overall system. Local anti-viral software, which runs in parallel with the virus incidence predictor, includes, but is not limited to, VirusScan, GroupShield, and WebShield software packages available from McAfee.com of Sunnyvale, Calif.
After the drivers and/or dats are applied or effectively installed by local anti-viral software, a report which warns of the virus is generated in step218. Generally, in order to generate a report, the virus incidence predictor notifies the alert manager that new drivers and/or dats have been applied. The alert manager application then provides a report to a network administrator, e.g., via electronic mail or a pager, to warn the network administrator of the virus so that the network administrator may implement appropriate measures. In one embodiment, the network administrator may notify substantially all clients within the overall system that a virus which is likely to cause a significant infection may permeate the overall system. It should be appreciated that the alert manager application may also substantially directly notify clients within the overall system of the existence of the virus which may potentially affect the overall system. Once the report which warns of the virus is generated in step218, process flow returns to step202 in which the overall system operates, and the anti-virus website is periodically polled to check for newly announced viruses.
Returning to step212, if the determination is that the virus alert is not a high risk alert, then instep220, the risk of the virus is determined with respect to the overall system. That is, the rank of the virus is determined with respect to the overall system. Ranking the virus generally includes assessing the risk of the virus to the overall system, irregardless to the risk identified in the virus alert itself, as will be described below with respect toFIG. 4. Once the virus is ranked, a determination is made instep222 as to whether the virus is likely to cause a significant infection within the overall system. If it is determined that the virus is not likely to cause a significant infection, then process flow returns to step202 in which the anti-viral website is periodically polled to check for newly announced viruses. Alternatively, if it is determined that the virus is likely to cause a significant infection, the drivers and/or dats which are suitable for combating the virus are downloaded from the anti-viral website instep214.
It should be appreciated that the characterization of whether a virus is likely to cause a significant infection may vary. A virus which is identified as being of a high risk level is generally characterized as being likely to cause a significant infection. Typically, a virus which is of an unknown risk level is considered as being likely to cause a significant infection, as precautions such as downloading drivers and/or dats associated with a virus of an unknown risk level may prevent an infection in the event that the unknown risk level is actually a high risk level with respect to the overall system. In other words, since it is not known whether a virus of an unknown risk level may pose a significant risk to the overall system, such a virus is generally treated as effectively having a high risk level.
As mentioned above, when a virus is not characterized as being high risk in a virus alert that identifies the virus, then the risk or the risk level of the virus with respect to the overall system is characterized. The characterization, which is based at least in part upon the types of viruses which have previously affected the overall system, may then be used to determine whether the drivers and/or dats for the virus are to be substantially immediately downloaded by a virus incidence predictor. With respect toFIG. 4, the steps associated with ranking a virus for which an alert is received, i.e., step220 ofFIG. 2, will be described in accordance with an embodiment of the present invention. A process of ranking avirus220 begins atstep302 in which the virus, i.e., the “current” virus or the virus for which an alert was received, is compared to the stored virus profiles. The stored virus profiles are virus profiles for substantially all viruses which have been picked up by clients or machines within the overall system. In one embodiment, the stored virus profiles are associated with virus alerts received by the alert manager application from the clients of the overall system when viruses are picked up by the clients. Such virus profiles are generally stored in a database which is accessible to the virus incidence predictor.
Comparing the current virus to the stored virus profiles causes the virus profiles to be tracked and trended. Trending the virus profiles studies infection rates, the length the overall system has been affected by the profiled viruses, and how widespread the infections associated with the profiled viruses are. The current virus is compared against the virus profiles to effectively assess the probable magnitude of an infection caused by the current virus if the current virus infects the overall system.
After the current virus is compared to the stored virus profiles, a determination is made instep304 as to whether the current virus is of a type that has previously been profiled. If it is determined that the current virus is not of a type that has previously been profiled, then the current virus is ranked instep306 as being of an unknown risk level. Once the current virus is ranked as being of an unknown risk level, the process of ranking the virus is completed.
Alternatively, if it is determined instep304 that the virus is of a type which has previously been profiled, then a determination is made instep308 as to whether the infection associated with a previous virus of the same type as the current virus was prolonged. The duration of an infection that is considered prolonged may vary due, at least in part, to the specifications implemented by a network administrator. By way of example, an infection may be considered to be prolonged if the infection lasts for more than a week. Alternatively, an infection may be considered to be prolonged if the infection lasts for more than a day.
If it is determined that the infection associated with the previous virus was not prolonged, a determination is made instep310 regarding whether the infection associated with the previous virus of the same type as the current virus was widespread. In general, the classification of a previous virus as being widespread may be based upon the percentage of machines within the overall system which were infected by the previous virus. The percentage may vary depending upon specifications associated with the overall system. When it is determined that the infection associated with the previously profiled virus was not widespread, then the indication is that the current virus is likely to be neither prolonged nor widespread. As such, the current virus is characterized or ranked as being of a low risk level instep312. In one embodiment, a virus characterized as being of a low risk level is considered to be relatively unlikely to cause a significant infection within the overall system. Once the current virus is ranked, the process of ranking the virus is completed. On the other hand, if the determination instep310 is that the infection associated with the previous virus was widespread, then the current virus is ranked as being of a medium risk level instep314, and the process of ranking the current virus is completed.
Returning to step308, if it is determined that the infection associated with the previous virus was prolonged, then process flow proceeds to step316 in which it is determined if the infection associated with the previous virus was also widespread, in addition to being prolonged. If it is determined that the infection associated with the previous virus was not widespread, then the current virus is ranked instep318 as being of a medium risk level, and the process of ranking the current virus is completed. Alternatively, if it is determined that the infection associated with the previous virus was both prolonged and widespread, then process flow moves fromstep316 to step320 in which the current virus is ranked as being of a high risk level. That is, the current virus is characterized as being relatively likely to cause a significant infection within the overall system. After the current virus is ranked as being of a high risk level instep320, the process of ranking the virus is completed.
In order for a virus to be compared against existing virus profiles, when a virus is picked up by the overall system, i.e., when a virus infects or is detected within the overall system, the virus is characterized. The virus may be characterized by a virus incidence predictor, or by an application which is in communication with the virus incidence predictor. In the described embodiment, the virus is characterized by the virus incidence predictor which looks a the name of the virus, and also determines how long the virus has been causing an infection and how widespread the virus is by studying alerts from an alert manager. While such a characterization may occur substantially immediately after the virus has been eradicated from the overall system, it should be understood that such a characterization may instead occur at substantially fixed times, e.g., two times a week.
FIG. 5 is a process flow diagram which illustrates the steps associated with one method of characterizing a virus which has been detected on an overall system in accordance with an embodiment of the present invention. Aprocess400 of characterizing a virus begins at step402 in which the virus type is characterized, i.e., the type associated with the current virus is characterized. Typically, characterizing a virus type includes searching a table of virus types that is maintained within or by the virus incidence predictor. Such a table may be arranged to identify which virus types have the tendency to cause the most problems within the overall system.
Virus types that are identified in a list of viruses include, but are not limited to, mass mailer viruses, “Windows” viruses, word processor viruses, macro viruses, and script viruses. Mass mailer viruses infect a computer and automatically send electronic mail to substantially everyone included in an address list in a mailing program on the computer, while Windows viruses affect executable files installed on the computer using a Microsoft Windows package available from Microsoft Incorporated of Redmond, Wash. Word processor viruses affect files associated with a word processor, macro viruses affect macro files in spreadsheet applications such as Microsoft Excel which is available from Microsoft Incorporated, and script viruses affect script files.
An alert manager provides a type associated with the current virus by studying the name of the current virus. As will be appreciated by those skilled in the art, the name of a virus typically includes an indication of the virus type. By way of example, if a virus is a mass mailer type virus, the name of the virus generally includes an “@mm” extension.
After the virus type is characterized in step402, a determination is made regarding whether an infection by a virus or viruses of the same type as the virus being characterized, or the characterized virus type, was prolonged. Seestep404. For example, if the current virus that is being characterized is a mass mailer type virus, then it is determined whether an infection caused by both the current virus and previous mass mailer type viruses is prolonged. Such a determination is generally made by studying the database in which virus profiles are stored to identify the date and the time of the first instance of the characterized virus type within the overall system, as well as the date and the time of the last instance of the characterized virus type within the overall system. The last instance of the characterized virus type is typically the instance of the current virus.
The criteria used to determine if an infection is considered as being prolonged may vary widely. For instance, a length of time a virus infected a least a part of the overall system may be considered as prolonged if it exceeds the length of all other infections that affected at least a part of the overall system. Alternatively, a particular length of time may be used to define a prolonged infection, e.g., a duration of two days or a duration of one week may be considered to effectively define a prolonged infection.
If it is determined that the infection by viruses of the characterized virus type was prolonged, then the current virus is characterized as having a long duration in step406. Alternatively, if it is determined that the infection was not prolonged, then the current virus is characterized as having a short duration, or not having a long duration, instep408. Although substantially only a long duration and a short duration are considered in the described embodiment, it should be understood that in other embodiments, intermediate durations such as a medium duration may also be considered in addition to a long duration and a short duration.
Fromsteps406 and408, process flow moves to step416 in which a determination is made regarding whether the infection caused by the current virus was widespread or had a relatively significant scope. That is, it is determined whether the infection is considered to have infected a significant portion of the overall system. The criteria used to characterize an infection as widespread or having a significant scope may generally vary. For example, the infection may be considered to be widespread if a larger percentage of the overall system was infected than was previously infected by other viruses. Alternatively, the infection may be considered to be widespread if more than a particular percentage, e.g., more than fifty percent, of the overall system was infected by the current virus.
If it is determined instep410 that the infection attributed to the current virus was widespread, the current virus is characterized as being widespread in step416. On the other hand, if the infection caused by the current virus is not determined to have been widespread, then the current virus is characterized as not being widespread instep412. Once the infection is either characterized as being widespread in step416 or as not being widespread instep412, the characterizations of the current virus are stored in a virus profile in step414. That is, the characterized type associated with the current virus, the characterized duration of the current virus, and the characterized infectious scope of the current virus are placed into a profile that is stored on a database that is accessible to the virus incidence predictor. After the profile is created and stored, the process of characterizing a virus that has affected an overall system is completed.
While a virus incidence predictor may periodically poll an anti-virus website to check for newly announced viruses, as discussed above with respect toFIG. 3, a virus incidence predictor may instead be notified by an anti-viral website when newly announced viruses are identified. For example, a notification of a virus alert may be sent from the anti-virus website to the virus incidence predictor.FIG. 6 is a process flow diagram which illustrates the steps associated with a method of predicting the incidence of a virus which involves receiving notifications from an anti-viral website in accordance with a second embodiment of the present invention. Aprocess500 begins atstep502 in which an overall system operates. In the described embodiment, the operation of the overall system includes automatically periodically checking an alert manager to determine if any alerts have been picked up by the overall system, as well as allowing an anti-virus system associated with the overall system to periodically download drivers and/or dats from an anti-virus website.
A determination is made instep504 as to whether a notification of a virus alert has been received while the overall system operates. That is, it is determined if the virus incidence predictor has received a notification from an anti-viral website that at least one new virus has been announced. If it is determined that a notification of a virus alert has not been received, then process flow returns to step502 in which the overall system continues to operate. Alternatively, if it is determined that a notification was received, then a determination is made instep506 as to whether the virus alert associated with the notification is a high risk virus alert.
When the determination instep506 is that the virus alert is a high risk alert, the drivers and/or dats that are suitable for combating the virus are downloaded from the anti-viral website in step508. The downloaded drivers and/or dats may then be applied instep510 by anti-viral software that is local to the overall system. Once the drivers and/or dats are applied, a report which warns of the virus is generated instep512. After the report which warns of the virus is generated instep512, process flow returns to step502 in which the overall system continues to operate.
Returning to step506, if the determination is that the virus alert is not a high risk alert, the risk of the virus to the overall system is determined in step514. That is, the rank of the virus is determined with respect to the overall system. Ranking the virus generally includes assessing the susceptibility of the overall system to infection by the virus, as was described above with respect to irregardless to the risk identified in the virus alert itself, as was described above with respect toFIG. 4. After the virus is ranked, a determination is made instep516 as to whether the virus is likely to cause a significant infection within the overall system. If it is determined that the virus is not likely to cause a significant infection, then process flow returns to step502 in which the overall system continues to operate. Alternatively, if it is determined that the virus is likely to cause a significant infection, the drivers and/or dats which are suitable for combating the virus are downloaded from the anti-viral website in step508. It should be appreciated that if it is determined that the virus is not likely to cause a significant infection, the drivers and/or dats which are suitable for combating the virus may be downloaded at a later time by anti-virus software.
As mentioned above, a virus incidence predictor may be implemented within an overall system or organization, e.g., a system which includes a client and a server which are networked. One suitable system which includes a virus incidence predictor will be described with reference toFIG. 7 in accordance with an embodiment of the present invention. Anorganization702, e.g., a system, generally includes aserver706 and clients710.Server706 and clients710 may generally be part of an intranet, and may each be general purpose computing devices. One example of a general purpose computing device will be described below with respect toFIG. 8.
Clients710 communicate withserver706 across communications links714. By way of example, if a virus is detected on client710a, client710amay send an alert throughlinks714a,714dtoserver706 or, more specifically, analert manager718 onserver706. In one embodiment, client710cis in communication with a remote device726, e.g., a computing device that is external toorganization702, across acommunications link722.
Server706 is configured to includealert manager718 and a virus incidence predictor730. Virus incidence predictor730 is generally in communication across a communications link742 with ananti-viral website738 which, as shown, is external toorganization702. Virus incidence predictor730 may either periodically pollanti-viral website738 to determine when newly announced viruses have been added toanti-viral website738, or await notification fromanti-viral website738 relating to newly announced viruses. A database734 which stores virus profiles is accessible to virus incidence predictor730 across acommunications link746. In general, virus incidence predictor730 updates information stored on database734.
The present invention may be implemented within a system with which may include substantially any suitable computing device. By way of example, the present invention may generally be implemented within an overall computing network which includes a plurality of computing devices.FIG. 8 illustrates a typical, general purpose computing device or individual computer system suitable for implementing the present invention. A computing device orindividual computer system1030 includes any number of processors1032 (also referred to as central processing units, or CPUs) that are coupled to memory devices including primary storage devices1034 (typically a random access memory, or RAM) and primary storage devices1036 (typically a read only memory, or ROM). ROM acts to transfer data and instructions uni-directionally to theCPU1032, while RAM is used typically to transfer data and instructions in a bi-directional manner.
CPU1032 may generally include any number of processors. Bothprimary storage devices1034,1036 may include any suitable computer-readable media. Asecondary storage medium1038, which is typically a mass memory device, is also coupled bi-directionally toCPU1032 and provides additional data storage capacity. Themass memory device1038 is a computer-readable medium that may be used to store programs including computer code, data, and the like. Typically,mass memory device1038 is a storage medium such as a hard disk or a tape which is generally slower thanprimary storage devices1034,1036. Massmemory storage device1038 may take the form of a magnetic or paper tape reader or some other well-known device. It will be appreciated that the information retained within themass memory device1038, may, in appropriate cases, be incorporated in standard fashion as part ofRAM1034 as virtual memory. A specificprimary storage device1036 such as a CD-ROM may also pass data uni-directionally to theCPU1032.
CPU1032 is also coupled to one or more input/output devices1040 that may include, but are not limited to, devices such as video monitors, track balls, mice, keyboards, microphones, touch-sensitive displays, transducer card readers, magnetic or paper tape readers, tablets, styluses, voice or handwriting recognizers, or other well-known input devices such as, of course, other computers. Finally,CPU1032 optionally may be coupled to a computer or telecommunications network, e.g., a local area network, an internet network or an intranet network, using a network connection as shown generally at1042. With such a network connection, it is contemplated that theCPU1032 might receive information from the network, or might output information to the network in the course of performing the above-described method steps. Such information, which is often represented as a sequence of instructions to be executed usingCPU1032, may be received from and outputted to the network, for example, in the form of a computer data signal embodied in a carrier wave. The above-described devices and materials will be familiar to those of skill in the computer hardware and software arts.
Although only a few embodiments of the present invention have been described, it should be understood that the present invention may be embodied in many other specific forms without departing from the spirit or the scope of the present invention. By way of example, ranking a virus when a virus alert is received has been described as including a determination of whether a previous infection associated with a similar virus was prolonged and a determination of whether the previous infection was widespread within a system. In general, it should be understood that ranking a virus may include additional, or different, determinations. Other determinations include, but are not limited to, whether the previous infection effectively incapacitated the system and whether the ease with which the previous infection was eradicated.
Local anti-virus software has been described as running substantially in parallel with a virus incidence predictor. However, it should be appreciated that local anti-virus software may not necessarily run in parallel with the virus incidence predictor. In addition, the anti-virus software may not be on the same computer, e.g., server, as the virus incidence predictor. Instead, the anti-virus software may be present on a different computer within the same network as the virus incidence predictor.
While the present invention has been described as either polling one anti-viral or anti-virus website or receiving notification from one anti-viral website, more than one anti-virus website or mailing list may effectively be monitored to determine if there are newly announced viruses. For example, an anti-virus website maintained by Network Associates Technology, Inc. may be polled by a virus incidence predictor, while the virus incidence predictor monitors mailing lists including CVE, which is maintained by MITRE Corporation of McLean, Va., and SANS, which is maintained by SANS Institute of Bethesda, Md.
In general, the steps associated with methods of predicting the incidence of a virus, and of ranking the risk level of a virus, may be widely varied. Steps may be added, removed, altered, or reordered without departing from the spirit or the scope of the present invention. For example, in one embodiment, although the steps associated with predicting the incidence of a virus have been described in terms of addressing a single virus alert, the steps may be altered to address more than a single virus alert when more than one virus alert is received. In addition, the steps associated with polling an alert manager may be eliminated for an embodiment in which an alert manager is not used.
When a virus that has infected a system is characterized, a determination of whether the infection was prolonged is made. As described above, such a determination may include identifying the first instance of a similar virus and a last instance of a similar virus. In one embodiment, the determination may include establishing the duration of the recent infection of substantially only the actual virus that is being characterized.
The characterization of whether an infection was prolonged has been described as either causing the characterization of the infection as being long in duration or causing the characterization of the infection as being short in duration. In lieu of characterizing infections as either long in duration or short in duration, infections may also be characterized as having a medium or “average” duration. That is, the duration of an infection may be characterized as having one of any number of durations. Similarly, instead of either characterizing an infection as being widespread or characterizing the infection as not being widespread, an infection may be characterized as having a wide range, having a medium or average range, or having a short range.
The polling time intervals associated with polling an anti-virus website and checking an alert manager may vary depending upon the requirements of a particular system, e.g., as determined by a network administrator. For instance, polling time intervals may range from less than a day to more than a week. It should be appreciated that the polling time interval for the alert manager may vary from the polling time interval for the anti-virus website. That is, the alert manager and the anti-virus website may be polled at different time intervals.
While drivers and/or dats are described as being downloaded from a remote anti-virus website, the drivers and/or dats may instead be in the same overall system as a virus incidence predictor. That is, an anti-virus website and, hence, drivers and/or dats may be local to an overall system without departing from the spirit or the scope of the present invention. Therefore, the present examples are to be considered as illustrative and not restrictive, and the invention is not to be limited to the details given herein, but may be modified within the scope of the appended claims.

Claims (19)

1. A computer-implemented method for responding to a virus alert, the virus alert containing information pertaining to a new virus, the method comprising:
receiving the virus alert;
assessing a risk level associated with the new virus, the assessing including: obtaining information associated with at least one previous virus which has caused a previous infection on a computer system, and comparing the information pertaining to the new virus with the information associated with the previous virus which has cause the previous infection on the computer system; and
obtaining a program code based on the risk level;
wherein the previous virus and the new virus are of a first type, and the information associated with the previous virus which has caused the previous infection on the computer system includes data associated with a duration of the previous infection and a scope of the previous infection.
7. A computer program product responding to a virus alert, the virus alert being arranged to provide information pertaining to a new virus, the computer program product comprising:
computer code for receiving the virus alert;
computer code for assessing a risk level associated with the new virus, the assessing including: obtaining information associated with at least one previous virus which has caused a previous infection on a computer system, and comparing the information pertaining to the new virus with the information associated with the previous virus which has caused the previous infection on the computer system;
computer code for obtaining program code based on the risk level; and
a computer-readable medium that stores the computer codes;
wherein the previous virus and the new virus are of a first type, and the information associated with the previous virus which has caused the previous infection on the computer system includes data associated with a duration of the previous infection and a scope of the previous infection.
14. A computer system suitable for responding to a virus alert, the virus alert being providing information pertaining to a new virus, the computer system comprising:
computer code for receiving the virus alert;
computer code for assessing a risk level associated with the new virus, the assessing including: obtaining information associated with at least one previous virus which has caused a previous infection on the computer system, and comparing the information pertaining to the new virus with the information associated with the previous virus which has caused the previous infection on the computer system;
computer code for obtaining code based on the risk level;
a computer-readable medium that stores the computer codes; and
a processor that executes the computer codes;
wherein the previous virus and the new virus are of a first type, and the information associated with the previous virus which has caused the previous infection on the computer system includes data associated with a duration of the previous infection and a scope of the previous infection.
US09/916,9692001-03-302001-07-26Method and apparatus for predicting the incidence of a virusExpired - LifetimeUS7010696B1 (en)

Priority Applications (3)

Application NumberPriority DateFiling DateTitle
US09/916,969US7010696B1 (en)2001-03-302001-07-26Method and apparatus for predicting the incidence of a virus
US11/095,248US7409720B1 (en)2001-03-302005-03-30Virus prediction system and method
US11/149,895US7865956B1 (en)2001-03-302005-06-10Method and apparatus for predicting the incidence of a virus

Applications Claiming Priority (2)

Application NumberPriority DateFiling DateTitle
US28059401P2001-03-302001-03-30
US09/916,969US7010696B1 (en)2001-03-302001-07-26Method and apparatus for predicting the incidence of a virus

Related Child Applications (2)

Application NumberTitlePriority DateFiling Date
US11/095,248ContinuationUS7409720B1 (en)2001-03-302005-03-30Virus prediction system and method
US11/149,895DivisionUS7865956B1 (en)2001-03-302005-06-10Method and apparatus for predicting the incidence of a virus

Publications (1)

Publication NumberPublication Date
US7010696B1true US7010696B1 (en)2006-03-07

Family

ID=35966415

Family Applications (3)

Application NumberTitlePriority DateFiling Date
US09/916,969Expired - LifetimeUS7010696B1 (en)2001-03-302001-07-26Method and apparatus for predicting the incidence of a virus
US11/095,248Expired - LifetimeUS7409720B1 (en)2001-03-302005-03-30Virus prediction system and method
US11/149,895Expired - LifetimeUS7865956B1 (en)2001-03-302005-06-10Method and apparatus for predicting the incidence of a virus

Family Applications After (2)

Application NumberTitlePriority DateFiling Date
US11/095,248Expired - LifetimeUS7409720B1 (en)2001-03-302005-03-30Virus prediction system and method
US11/149,895Expired - LifetimeUS7865956B1 (en)2001-03-302005-06-10Method and apparatus for predicting the incidence of a virus

Country Status (1)

CountryLink
US (3)US7010696B1 (en)

Cited By (67)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20030088680A1 (en)*2001-04-062003-05-08Nachenberg Carey STemporal access control for computer virus prevention
US20030131248A1 (en)*2002-01-092003-07-10Hui-Chieh HuangProcess for preventing virus infection of data-processing system
US20030188181A1 (en)*2000-05-242003-10-02Hardy KunitzEncryption of data to be stored in an information processing system
US20030200460A1 (en)*2002-02-282003-10-23Ntt Docomo, IncServer apparatus, and information processing method
US20040064726A1 (en)*2002-09-302004-04-01Mario GirouardVulnerability management and tracking system (VMTS)
US20040073810A1 (en)*2002-10-102004-04-15International Business Machines CorporationAntiviral network system
US20040102999A1 (en)*2002-11-272004-05-27Monson Duke G.Validating an electronic transaction
US20040221178A1 (en)*2002-03-262004-11-04Aaron Jeffrey AFirewall system and method via feedback from broad-scope monitoring for intrusion detection
US20050005171A1 (en)*2003-07-012005-01-06Oliphant Brett M.Real-time vulnerability monitoring
US20060095963A1 (en)*2004-10-292006-05-04Simon CrosbyCollaborative attack detection in networks
US20060117209A1 (en)*2004-11-082006-06-01International Business Machines CorporationRepair system
US7080000B1 (en)*2001-03-302006-07-18Mcafee, Inc.Method and system for bi-directional updating of antivirus database
US20070192859A1 (en)*2006-01-312007-08-16Deutsche Telekom AgArchitecture for identifying electronic threat patterns
US20070256129A1 (en)*2006-04-272007-11-01Searete Llc, A Limited Liability Corporation Of The State Of DelawareMulti-network virus immunization with separate physical path
US20070256130A1 (en)*2006-04-272007-11-01Searete Llc, A Limited Liability Corporation Of The State Of DelawareMulti-network virus immunization with trust aspects
US20070255723A1 (en)*2006-04-272007-11-01Searete Llc, A Limited Liability Corporation Of The State Of DelawareEfficient distribution of a malware countermeasure
US20070256128A1 (en)*2006-04-272007-11-01Searete Llc, A Limited Liability Corporation Of The State Of DelawareVirus immunization using prioritized routing
US20070255724A1 (en)*2006-04-272007-11-01Searete, Llc, A Limited Liability Corporation Of The State Of DelawareGenerating and distributing a malware countermeasure
US20070256131A1 (en)*2006-04-272007-11-01Searete Llc, A Limited Liability Corporation Of The State Of DelawareVirus immunization using entity-sponsored bypass network
US20070271615A1 (en)*2006-04-272007-11-22Searete Llc, A Limited Liability Corporation Of The State Of DelawareVirus immunization using entity-sponsored bypass network
US20070271616A1 (en)*2006-04-272007-11-22Searete Llc, A Limited Liability Corporation Of The State Of DelawareVirus immunization using prioritized routing
US20070294765A1 (en)*2004-07-132007-12-20Sonicwall, Inc.Managing infectious forwarded messages
US20080005555A1 (en)*2002-10-012008-01-03Amnon LotemSystem, method and computer readable medium for evaluating potential attacks of worms
US20080104703A1 (en)*2004-07-132008-05-01Mailfrontier, Inc.Time Zero Detection of Infectious Messages
US7469419B2 (en)2002-10-072008-12-23Symantec CorporationDetection of malicious computer code
US7624450B1 (en)*2002-12-132009-11-24Mcafee, Inc.System, method, and computer program product for conveying a status of a plurality of security applications
US7739494B1 (en)2003-04-252010-06-15Symantec CorporationSSL validation and stripping using trustworthiness factors
US7865956B1 (en)2001-03-302011-01-04Mcafee, Inc.Method and apparatus for predicting the incidence of a virus
US20110016529A1 (en)*2008-03-262011-01-20Fujitsu LimitedInformation processing apparatus cooperating with virus management function device, and anti-virus method
US8122498B1 (en)2002-12-122012-02-21Mcafee, Inc.Combined multiple-application alert system and method
US8204945B2 (en)2000-06-192012-06-19Stragent, LlcHash-based systems and methods for detecting and preventing transmission of unwanted e-mail
US8229864B1 (en)*2011-05-062012-07-24Google Inc.Predictive model application programming interface
US8239941B1 (en)2002-12-132012-08-07Mcafee, Inc.Push alert system, method, and computer program product
US8250009B1 (en)2011-01-262012-08-21Google Inc.Updateable predictive analytical modeling
US8312535B1 (en)2002-12-122012-11-13Mcafee, Inc.System, method, and computer program product for interfacing a plurality of related applications
US8311967B1 (en)2010-05-142012-11-13Google Inc.Predictive analytical model matching
US8332947B1 (en)*2006-06-272012-12-11Symantec CorporationSecurity threat reporting in light of local security tools
US8364613B1 (en)2011-07-142013-01-29Google Inc.Hosting predictive models
US8370279B1 (en)2011-09-292013-02-05Google Inc.Normalization of predictive model scores
US8438122B1 (en)2010-05-142013-05-07Google Inc.Predictive analytic modeling platform
US8443013B1 (en)2011-07-292013-05-14Google Inc.Predictive analytical modeling for databases
US20130139261A1 (en)*2010-12-012013-05-30Imunet CorporationMethod and apparatus for detecting malicious software through contextual convictions
US8473431B1 (en)2010-05-142013-06-25Google Inc.Predictive analytic modeling platform
US8495747B1 (en)*2010-03-312013-07-23Mcafee, Inc.Prioritizing asset remediations
US8533224B2 (en)2011-05-042013-09-10Google Inc.Assessing accuracy of trained predictive models
US8595154B2 (en)2011-01-262013-11-26Google Inc.Dynamic predictive modeling platform
US8694540B1 (en)2011-09-012014-04-08Google Inc.Predictive analytical model selection
CN103886384A (en)*2012-12-202014-06-25伊姆西公司Data protection method and system
US8984644B2 (en)2003-07-012015-03-17Securityprofiling, LlcAnti-vulnerability system, method, and computer program product
US9088601B2 (en)2010-12-012015-07-21Cisco Technology, Inc.Method and apparatus for detecting malicious software through contextual convictions, generic signatures and machine learning techniques
US20150207813A1 (en)*2012-02-012015-07-23Vorstack, Inc.Techniques for sharing network security event information
US9100431B2 (en)2003-07-012015-08-04Securityprofiling, LlcComputer program product and apparatus for multi-path remediation
US9118709B2 (en)2003-07-012015-08-25Securityprofiling, LlcAnti-vulnerability system, method, and computer program product
US9118710B2 (en)2003-07-012015-08-25Securityprofiling, LlcSystem, method, and computer program product for reporting an occurrence in different manners
US9118711B2 (en)2003-07-012015-08-25Securityprofiling, LlcAnti-vulnerability system, method, and computer program product
US9118708B2 (en)2003-07-012015-08-25Securityprofiling, LlcMulti-path remediation
US9258327B2 (en)2006-04-272016-02-09Invention Science Fund I, LlcMulti-network virus immunization
US9350752B2 (en)2003-07-012016-05-24Securityprofiling, LlcAnti-vulnerability system, method, and computer program product
US20160234251A1 (en)*2015-02-062016-08-11Honeywell International Inc.Notification subsystem for generating consolidated, filtered, and relevant security risk-based notifications
US9507944B2 (en)2002-10-012016-11-29Skybox Security Inc.Method for simulation aided security event management
US9680846B2 (en)2012-02-012017-06-13Servicenow, Inc.Techniques for sharing network security event information
US9756082B1 (en)2012-02-012017-09-05Servicenow, Inc.Scalable network security with fast response protocol
US10333960B2 (en)2017-05-032019-06-25Servicenow, Inc.Aggregating network security data for export
US10686805B2 (en)2015-12-112020-06-16Servicenow, Inc.Computer network threat assessment
CN113555129A (en)*2021-07-202021-10-26西安交通大学 Method and device for risk prediction of virus infection in sewage pipe network
US11575703B2 (en)2017-05-052023-02-07Servicenow, Inc.Network security threat intelligence sharing
US20240143762A1 (en)*2021-07-202024-05-02Bank Of America CorportionHybrid Machine Learning and Knowledge Graph Approach for Estimating and Mitigating the Spread of Malicious Software

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US7529754B2 (en)2003-03-142009-05-05Websense, Inc.System and method of monitoring and controlling application files
US7185015B2 (en)*2003-03-142007-02-27Websense, Inc.System and method of monitoring and controlling application files
GB0513375D0 (en)2005-06-302005-08-03Retento LtdComputer security
US8255517B1 (en)*2006-06-292012-08-28Symantec CorporationMethod and apparatus to determine device mobility history
FI20060665A0 (en)*2006-07-072006-07-07Nokia Corp deviation detection
US8726391B1 (en)*2008-10-102014-05-13Symantec CorporationScheduling malware signature updates in relation to threat awareness and environmental safety
US8448245B2 (en)*2009-01-172013-05-21Stopthehacker.com, Jaal LLCAutomated identification of phishing, phony and malicious web sites
US10210162B1 (en)2010-03-292019-02-19Carbonite, Inc.Log file management
US9715325B1 (en)2012-06-212017-07-25Open Text CorporationActivity stream based interaction
WO2015200211A1 (en)2014-06-222015-12-30Webroot Inc.Network threat prediction and blocking
US10395133B1 (en)2015-05-082019-08-27Open Text CorporationImage box filtering for optical character recognition
US10599844B2 (en)2015-05-122020-03-24Webroot, Inc.Automatic threat detection of executable files based on static data analysis
US10289686B1 (en)2015-06-302019-05-14Open Text CorporationMethod and system for using dynamic content types
US10728034B2 (en)2018-02-232020-07-28Webroot Inc.Security privilege escalation exploit detection and mitigation
US11314863B2 (en)2019-03-272022-04-26Webroot, Inc.Behavioral threat detection definition and compilation

Citations (20)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
GB2283341A (en)1993-10-291995-05-03Sophos PlcCentral virus checker for computer network.
US5414833A (en)1993-10-271995-05-09International Business Machines CorporationNetwork security system and method using a parallel finite state machine adaptive active monitor and responder
US5832208A (en)1996-09-051998-11-03Cheyenne Software International Sales Corp.Anti-virus agent for use with databases and mail servers
US5842216A (en)1996-05-031998-11-24Mitsubishi Electric Information Technology Center America, Inc.System for sending small positive data notification messages over a network to indicate that a recipient node should obtain a particular version of a particular data item
US5948104A (en)1997-05-231999-09-07Neuromedical Systems, Inc.System and method for automated anti-viral file update
US5951698A (en)1996-10-021999-09-14Trend Micro, IncorporatedSystem, apparatus and method for the detection and removal of viruses in macros
US5960170A (en)1997-03-181999-09-28Trend Micro, Inc.Event triggered iterative virus detection
JPH11282673A (en)1998-03-311999-10-15Toshiba Corp Computer virus infection route detection method and recording medium for recording trace virus used in the method
US5999723A (en)1995-09-281999-12-07Symantec CorporationState-based cache for antivirus software
WO2000005852A1 (en)1998-07-212000-02-03Raytheon CompanyInformation security analysis system
US6029256A (en)1997-12-312000-02-22Network Associates, Inc.Method and system for allowing computer programs easy access to features of a virus scanning engine
US6035423A (en)1997-12-312000-03-07Network Associates, Inc.Method and system for providing automated updating and upgrading of antivirus applications using a computer network
US6067410A (en)1996-02-092000-05-23Symantec CorporationEmulation repair system
US6088804A (en)1998-01-122000-07-11Motorola, Inc.Adaptive system and method for responding to computer network security attacks
US6092194A (en)1996-11-082000-07-18Finjan Software, Ltd.System and method for protecting a computer and a network from hostile downloadables
US6123737A (en)1997-05-212000-09-26Symantec CorporationPush deployment of software packages using notification transports
US6154844A (en)1996-11-082000-11-28Finjan Software, Ltd.System and method for attaching a downloadable security profile to a downloadable
US6182226B1 (en)1998-03-182001-01-30Secure Computing CorporationSystem and method for controlling interactions between networks
US6199178B1 (en)1997-09-052001-03-06Wild File, Inc.Method, software and apparatus for saving, using and recovering data
US6393424B1 (en)*1999-12-292002-05-21Networks Associates, Inc.Method and apparatus for using a static metadata object to reduce database accesses

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6279113B1 (en)1998-03-162001-08-21Internet Tools, Inc.Dynamic signature inspection-based network intrusion detection
US6577920B1 (en)*1998-10-022003-06-10Data Fellows OyjComputer virus screening
US6321338B1 (en)*1998-11-092001-11-20Sri InternationalNetwork surveillance
US7010696B1 (en)2001-03-302006-03-07Mcafee, Inc.Method and apparatus for predicting the incidence of a virus

Patent Citations (21)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5414833A (en)1993-10-271995-05-09International Business Machines CorporationNetwork security system and method using a parallel finite state machine adaptive active monitor and responder
GB2283341A (en)1993-10-291995-05-03Sophos PlcCentral virus checker for computer network.
US5999723A (en)1995-09-281999-12-07Symantec CorporationState-based cache for antivirus software
US6067410A (en)1996-02-092000-05-23Symantec CorporationEmulation repair system
US5842216A (en)1996-05-031998-11-24Mitsubishi Electric Information Technology Center America, Inc.System for sending small positive data notification messages over a network to indicate that a recipient node should obtain a particular version of a particular data item
US5832208A (en)1996-09-051998-11-03Cheyenne Software International Sales Corp.Anti-virus agent for use with databases and mail servers
US5951698A (en)1996-10-021999-09-14Trend Micro, IncorporatedSystem, apparatus and method for the detection and removal of viruses in macros
US6167520A (en)1996-11-082000-12-26Finjan Software, Inc.System and method for protecting a client during runtime from hostile downloadables
US6154844A (en)1996-11-082000-11-28Finjan Software, Ltd.System and method for attaching a downloadable security profile to a downloadable
US6092194A (en)1996-11-082000-07-18Finjan Software, Ltd.System and method for protecting a computer and a network from hostile downloadables
US5960170A (en)1997-03-181999-09-28Trend Micro, Inc.Event triggered iterative virus detection
US6123737A (en)1997-05-212000-09-26Symantec CorporationPush deployment of software packages using notification transports
US5948104A (en)1997-05-231999-09-07Neuromedical Systems, Inc.System and method for automated anti-viral file update
US6199178B1 (en)1997-09-052001-03-06Wild File, Inc.Method, software and apparatus for saving, using and recovering data
US6035423A (en)1997-12-312000-03-07Network Associates, Inc.Method and system for providing automated updating and upgrading of antivirus applications using a computer network
US6029256A (en)1997-12-312000-02-22Network Associates, Inc.Method and system for allowing computer programs easy access to features of a virus scanning engine
US6088804A (en)1998-01-122000-07-11Motorola, Inc.Adaptive system and method for responding to computer network security attacks
US6182226B1 (en)1998-03-182001-01-30Secure Computing CorporationSystem and method for controlling interactions between networks
JPH11282673A (en)1998-03-311999-10-15Toshiba Corp Computer virus infection route detection method and recording medium for recording trace virus used in the method
WO2000005852A1 (en)1998-07-212000-02-03Raytheon CompanyInformation security analysis system
US6393424B1 (en)*1999-12-292002-05-21Networks Associates, Inc.Method and apparatus for using a static metadata object to reduce database accesses

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
http://www.ssimail.com/sesfacts.htm.

Cited By (149)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20030188181A1 (en)*2000-05-242003-10-02Hardy KunitzEncryption of data to be stored in an information processing system
US8272060B2 (en)2000-06-192012-09-18Stragent, LlcHash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses
US8204945B2 (en)2000-06-192012-06-19Stragent, LlcHash-based systems and methods for detecting and preventing transmission of unwanted e-mail
US7865956B1 (en)2001-03-302011-01-04Mcafee, Inc.Method and apparatus for predicting the incidence of a virus
US7080000B1 (en)*2001-03-302006-07-18Mcafee, Inc.Method and system for bi-directional updating of antivirus database
US20030088680A1 (en)*2001-04-062003-05-08Nachenberg Carey STemporal access control for computer virus prevention
US7483993B2 (en)2001-04-062009-01-27Symantec CorporationTemporal access control for computer virus prevention
US20030131248A1 (en)*2002-01-092003-07-10Hui-Chieh HuangProcess for preventing virus infection of data-processing system
US7260832B2 (en)*2002-01-092007-08-21Via Technologies, Inc.Process for preventing virus infection of data-processing system
US7890619B2 (en)*2002-02-282011-02-15Ntt Docomo, Inc.Server apparatus, and information processing method for notifying of detection of computer virus
US20030200460A1 (en)*2002-02-282003-10-23Ntt Docomo, IncServer apparatus, and information processing method
US20040221178A1 (en)*2002-03-262004-11-04Aaron Jeffrey AFirewall system and method via feedback from broad-scope monitoring for intrusion detection
US20040064726A1 (en)*2002-09-302004-04-01Mario GirouardVulnerability management and tracking system (VMTS)
US20080005555A1 (en)*2002-10-012008-01-03Amnon LotemSystem, method and computer readable medium for evaluating potential attacks of worms
US8359650B2 (en)*2002-10-012013-01-22Skybox Secutiry Inc.System, method and computer readable medium for evaluating potential attacks of worms
US8904542B2 (en)*2002-10-012014-12-02Skybox Security Inc.System, method and computer readable medium for evaluating potential attacks of worms
US20130219503A1 (en)*2002-10-012013-08-22Lotem AmnonSystem, method and computer readable medium for evaluating potential attacks of worms
US9507944B2 (en)2002-10-012016-11-29Skybox Security Inc.Method for simulation aided security event management
US7469419B2 (en)2002-10-072008-12-23Symantec CorporationDetection of malicious computer code
US7437760B2 (en)*2002-10-102008-10-14International Business Machines CorporationAntiviral network system
US7739739B2 (en)*2002-10-102010-06-15Trend Micro IncorporatedAntiviral network system
US20040073810A1 (en)*2002-10-102004-04-15International Business Machines CorporationAntiviral network system
US20080295177A1 (en)*2002-10-102008-11-27International Business Machines CorporationAntiviral network system
US20080271149A1 (en)*2002-10-102008-10-30International Business Machines CorporationAntiviral network system
US7945957B2 (en)*2002-10-102011-05-17Trend Micro IncorporatedAntiviral network system
US20040102999A1 (en)*2002-11-272004-05-27Monson Duke G.Validating an electronic transaction
US8321235B2 (en)2002-11-272012-11-27Hewlett-Packard Development Company, L.P.Validating an electronic transaction
US8122498B1 (en)2002-12-122012-02-21Mcafee, Inc.Combined multiple-application alert system and method
US8732835B2 (en)2002-12-122014-05-20Mcafee, Inc.System, method, and computer program product for interfacing a plurality of related applications
US8312535B1 (en)2002-12-122012-11-13Mcafee, Inc.System, method, and computer program product for interfacing a plurality of related applications
US8239941B1 (en)2002-12-132012-08-07Mcafee, Inc.Push alert system, method, and computer program product
US8990723B1 (en)2002-12-132015-03-24Mcafee, Inc.System, method, and computer program product for managing a plurality of applications via a single interface
US8074282B1 (en)2002-12-132011-12-06Mcafee, Inc.System, method, and computer program product for conveying a status of a plurality of security applications
US8230502B1 (en)2002-12-132012-07-24Mcafee, Inc.Push alert system, method, and computer program product
US9177140B1 (en)2002-12-132015-11-03Mcafee, Inc.System, method, and computer program product for managing a plurality of applications via a single interface
US9791998B2 (en)2002-12-132017-10-17Mcafee, Inc.System, method, and computer program product for managing a plurality of applications via a single interface
US7624450B1 (en)*2002-12-132009-11-24Mcafee, Inc.System, method, and computer program product for conveying a status of a plurality of security applications
US8115769B1 (en)2002-12-132012-02-14Mcafee, Inc.System, method, and computer program product for conveying a status of a plurality of security applications
US7739494B1 (en)2003-04-252010-06-15Symantec CorporationSSL validation and stripping using trustworthiness factors
US20070113272A2 (en)*2003-07-012007-05-17Securityprofiling, Inc.Real-time vulnerability monitoring
US8984644B2 (en)2003-07-012015-03-17Securityprofiling, LlcAnti-vulnerability system, method, and computer program product
US9100431B2 (en)2003-07-012015-08-04Securityprofiling, LlcComputer program product and apparatus for multi-path remediation
US9118709B2 (en)2003-07-012015-08-25Securityprofiling, LlcAnti-vulnerability system, method, and computer program product
US9118710B2 (en)2003-07-012015-08-25Securityprofiling, LlcSystem, method, and computer program product for reporting an occurrence in different manners
US9118711B2 (en)2003-07-012015-08-25Securityprofiling, LlcAnti-vulnerability system, method, and computer program product
US9118708B2 (en)2003-07-012015-08-25Securityprofiling, LlcMulti-path remediation
US9117069B2 (en)2003-07-012015-08-25Securityprofiling, LlcReal-time vulnerability monitoring
US9225686B2 (en)2003-07-012015-12-29Securityprofiling, LlcAnti-vulnerability system, method, and computer program product
US9350752B2 (en)2003-07-012016-05-24Securityprofiling, LlcAnti-vulnerability system, method, and computer program product
US10021124B2 (en)2003-07-012018-07-10Securityprofiling, LlcComputer program product and apparatus for multi-path remediation
US10050988B2 (en)2003-07-012018-08-14Securityprofiling, LlcComputer program product and apparatus for multi-path remediation
US20060230441A2 (en)*2003-07-012006-10-12Securityprofiling, Inc.Real-time vulnerability monitoring
US10104110B2 (en)2003-07-012018-10-16Securityprofiling, LlcAnti-vulnerability system, method, and computer program product
US10154055B2 (en)2003-07-012018-12-11Securityprofiling, LlcReal-time vulnerability monitoring
US20050005171A1 (en)*2003-07-012005-01-06Oliphant Brett M.Real-time vulnerability monitoring
US9237163B2 (en)2004-07-132016-01-12Dell Software Inc.Managing infectious forwarded messages
US20080104703A1 (en)*2004-07-132008-05-01Mailfrontier, Inc.Time Zero Detection of Infectious Messages
US9154511B1 (en)2004-07-132015-10-06Dell Software Inc.Time zero detection of infectious messages
US8850566B2 (en)2004-07-132014-09-30Sonicwall, Inc.Time zero detection of infectious messages
US20070294765A1 (en)*2004-07-132007-12-20Sonicwall, Inc.Managing infectious forwarded messages
US8122508B2 (en)2004-07-132012-02-21Sonicwall, Inc.Analyzing traffic patterns to detect infectious messages
US8955136B2 (en)2004-07-132015-02-10Sonicwall, Inc.Analyzing traffic patterns to detect infectious messages
US7343624B1 (en)2004-07-132008-03-11Sonicwall, Inc.Managing infectious messages as identified by an attachment
US10069851B2 (en)2004-07-132018-09-04Sonicwall Inc.Managing infectious forwarded messages
US9516047B2 (en)2004-07-132016-12-06Dell Software Inc.Time zero classification of messages
US9325724B2 (en)2004-07-132016-04-26Dell Software Inc.Time zero classification of messages
US20080134336A1 (en)*2004-07-132008-06-05Mailfrontier, Inc.Analyzing traffic patterns to detect infectious messages
US8955106B2 (en)2004-07-132015-02-10Sonicwall, Inc.Managing infectious forwarded messages
US10084801B2 (en)2004-07-132018-09-25Sonicwall Inc.Time zero classification of messages
US20060095963A1 (en)*2004-10-292006-05-04Simon CrosbyCollaborative attack detection in networks
US20060117209A1 (en)*2004-11-082006-06-01International Business Machines CorporationRepair system
US7716527B2 (en)*2004-11-082010-05-11International Business Machines CorporationRepair system
US7941851B2 (en)*2006-01-312011-05-10Deutsche Telekom AgArchitecture for identifying electronic threat patterns
US20070192859A1 (en)*2006-01-312007-08-16Deutsche Telekom AgArchitecture for identifying electronic threat patterns
US7849508B2 (en)2006-04-272010-12-07The Invention Science Fund I, LlcVirus immunization using entity-sponsored bypass network
US8146161B2 (en)2006-04-272012-03-27The Invention Science Fund I, LlcMulti-network virus immunization with separate physical path
US20070256128A1 (en)*2006-04-272007-11-01Searete Llc, A Limited Liability Corporation Of The State Of DelawareVirus immunization using prioritized routing
US20070255724A1 (en)*2006-04-272007-11-01Searete, Llc, A Limited Liability Corporation Of The State Of DelawareGenerating and distributing a malware countermeasure
US20070256129A1 (en)*2006-04-272007-11-01Searete Llc, A Limited Liability Corporation Of The State Of DelawareMulti-network virus immunization with separate physical path
US8191145B2 (en)2006-04-272012-05-29The Invention Science Fund I, LlcVirus immunization using prioritized routing
US8539581B2 (en)2006-04-272013-09-17The Invention Science Fund I, LlcEfficient distribution of a malware countermeasure
US20070256130A1 (en)*2006-04-272007-11-01Searete Llc, A Limited Liability Corporation Of The State Of DelawareMulti-network virus immunization with trust aspects
US20070256131A1 (en)*2006-04-272007-11-01Searete Llc, A Limited Liability Corporation Of The State Of DelawareVirus immunization using entity-sponsored bypass network
US8151353B2 (en)2006-04-272012-04-03The Invention Science Fund I, LlcMulti-network virus immunization with trust aspects
US20070261119A1 (en)*2006-04-272007-11-08Searete Llc, A Limited Liability Corporation Of The State Of DelawareVirus immunization using prioritized routing
US9258327B2 (en)2006-04-272016-02-09Invention Science Fund I, LlcMulti-network virus immunization
US20070256071A1 (en)*2006-04-272007-11-01Jung Edward KMulti-network virus immunization
US8839437B2 (en)2006-04-272014-09-16The Invention Science Fund I, LlcMulti-network virus immunization
US20070271615A1 (en)*2006-04-272007-11-22Searete Llc, A Limited Liability Corporation Of The State Of DelawareVirus immunization using entity-sponsored bypass network
US8863285B2 (en)2006-04-272014-10-14The Invention Science Fund I, LlcVirus immunization using prioritized routing
US20070271616A1 (en)*2006-04-272007-11-22Searete Llc, A Limited Liability Corporation Of The State Of DelawareVirus immunization using prioritized routing
US7934260B2 (en)2006-04-272011-04-26The Invention Science Fund I, LlcVirus immunization using entity-sponsored bypass network
US8424089B2 (en)2006-04-272013-04-16The Invention Science Fund I, LlcVirus immunization using prioritized routing
US7917956B2 (en)2006-04-272011-03-29The Invention Science Fund I, LlcMulti-network virus immunization
US8966630B2 (en)2006-04-272015-02-24The Invention Science Fund I, LlcGenerating and distributing a malware countermeasure
US20070255723A1 (en)*2006-04-272007-11-01Searete Llc, A Limited Liability Corporation Of The State Of DelawareEfficient distribution of a malware countermeasure
WO2007149564A3 (en)*2006-06-222008-08-28Searete LlcVirus immunization using prioritized routing
US8332947B1 (en)*2006-06-272012-12-11Symantec CorporationSecurity threat reporting in light of local security tools
US20110016529A1 (en)*2008-03-262011-01-20Fujitsu LimitedInformation processing apparatus cooperating with virus management function device, and anti-virus method
US8689332B2 (en)2008-03-262014-04-01Fujitsu LimitedInformation processing apparatus cooperating with virus management function device, and anti-virus method
EP2259203A4 (en)*2008-03-262011-05-25Fujitsu Ltd INFORMATION PROCESSING DEVICE, VIRUS MANAGEMENT EQUIPMENT, AND METHOD OF DISINFECTING VIRUSES
US8495747B1 (en)*2010-03-312013-07-23Mcafee, Inc.Prioritizing asset remediations
US9189747B2 (en)2010-05-142015-11-17Google Inc.Predictive analytic modeling platform
US8438122B1 (en)2010-05-142013-05-07Google Inc.Predictive analytic modeling platform
US8706659B1 (en)2010-05-142014-04-22Google Inc.Predictive analytic modeling platform
US8473431B1 (en)2010-05-142013-06-25Google Inc.Predictive analytic modeling platform
US8311967B1 (en)2010-05-142012-11-13Google Inc.Predictive analytical model matching
US8909568B1 (en)2010-05-142014-12-09Google Inc.Predictive analytic modeling platform
US8521664B1 (en)2010-05-142013-08-27Google Inc.Predictive analytical model matching
US20130139261A1 (en)*2010-12-012013-05-30Imunet CorporationMethod and apparatus for detecting malicious software through contextual convictions
US9218461B2 (en)*2010-12-012015-12-22Cisco Technology, Inc.Method and apparatus for detecting malicious software through contextual convictions
US9088601B2 (en)2010-12-012015-07-21Cisco Technology, Inc.Method and apparatus for detecting malicious software through contextual convictions, generic signatures and machine learning techniques
US8533222B2 (en)2011-01-262013-09-10Google Inc.Updateable predictive analytical modeling
US8250009B1 (en)2011-01-262012-08-21Google Inc.Updateable predictive analytical modeling
US8595154B2 (en)2011-01-262013-11-26Google Inc.Dynamic predictive modeling platform
US8533224B2 (en)2011-05-042013-09-10Google Inc.Assessing accuracy of trained predictive models
US9239986B2 (en)2011-05-042016-01-19Google Inc.Assessing accuracy of trained predictive models
US9020861B2 (en)2011-05-062015-04-28Google Inc.Predictive model application programming interface
US8229864B1 (en)*2011-05-062012-07-24Google Inc.Predictive model application programming interface
US8364613B1 (en)2011-07-142013-01-29Google Inc.Hosting predictive models
US8443013B1 (en)2011-07-292013-05-14Google Inc.Predictive analytical modeling for databases
US8694540B1 (en)2011-09-012014-04-08Google Inc.Predictive analytical model selection
US10504024B2 (en)2011-09-292019-12-10Google LlcNormalization of predictive model scores
US9406019B2 (en)2011-09-292016-08-02Google Inc.Normalization of predictive model scores
US8370279B1 (en)2011-09-292013-02-05Google Inc.Normalization of predictive model scores
US9756082B1 (en)2012-02-012017-09-05Servicenow, Inc.Scalable network security with fast response protocol
US11222111B2 (en)2012-02-012022-01-11Servicenow, Inc.Techniques for sharing network security event information
US20170316203A1 (en)*2012-02-012017-11-02Servicenow, Inc.Techniques for sharing network security event information
US9710644B2 (en)*2012-02-012017-07-18Servicenow, Inc.Techniques for sharing network security event information
US11388200B2 (en)*2012-02-012022-07-12Servicenow, Inc.Scalable network security detection and prevention platform
US9680846B2 (en)2012-02-012017-06-13Servicenow, Inc.Techniques for sharing network security event information
US10032020B2 (en)*2012-02-012018-07-24Servicenow, Inc.Techniques for sharing network security event information
US10628582B2 (en)2012-02-012020-04-21Servicenow, Inc.Techniques for sharing network security event information
US20150207813A1 (en)*2012-02-012015-07-23Vorstack, Inc.Techniques for sharing network security event information
US10225288B2 (en)2012-02-012019-03-05Servicenow, Inc.Scalable network security detection and prevention platform
US10412103B2 (en)2012-02-012019-09-10Servicenow, Inc.Techniques for sharing network security event information
CN103886384B (en)*2012-12-202018-10-19伊姆西公司method and system for data protection
CN103886384A (en)*2012-12-202014-06-25伊姆西公司Data protection method and system
US10075474B2 (en)*2015-02-062018-09-11Honeywell International Inc.Notification subsystem for generating consolidated, filtered, and relevant security risk-based notifications
US20160234251A1 (en)*2015-02-062016-08-11Honeywell International Inc.Notification subsystem for generating consolidated, filtered, and relevant security risk-based notifications
US10686805B2 (en)2015-12-112020-06-16Servicenow, Inc.Computer network threat assessment
US11539720B2 (en)2015-12-112022-12-27Servicenow, Inc.Computer network threat assessment
US11223640B2 (en)2017-05-032022-01-11Servicenow, Inc.Aggregating network security data for export
US10333960B2 (en)2017-05-032019-06-25Servicenow, Inc.Aggregating network security data for export
US11743278B2 (en)2017-05-032023-08-29Servicenow, Inc.Aggregating network security data for export
US11575703B2 (en)2017-05-052023-02-07Servicenow, Inc.Network security threat intelligence sharing
CN113555129A (en)*2021-07-202021-10-26西安交通大学 Method and device for risk prediction of virus infection in sewage pipe network
CN113555129B (en)*2021-07-202023-12-29西安交通大学Sewage pipe network virus infection risk prediction method and device
US20240143762A1 (en)*2021-07-202024-05-02Bank Of America CorportionHybrid Machine Learning and Knowledge Graph Approach for Estimating and Mitigating the Spread of Malicious Software

Also Published As

Publication numberPublication date
US7409720B1 (en)2008-08-05
US7865956B1 (en)2011-01-04

Similar Documents

PublicationPublication DateTitle
US7010696B1 (en)Method and apparatus for predicting the incidence of a virus
US11068588B2 (en)Detecting irregularities on a device
EP3356985B1 (en)Detection of security incidents with low confidence security events
US8312536B2 (en)Hygiene-based computer security
US9507936B2 (en)Systems, methods, apparatuses, and computer program products for forensic monitoring
US7231637B1 (en)Security and software testing of pre-release anti-virus updates on client and transmitting the results to the server
US9202048B2 (en)Method and system for discrete stateful behavioral analysis
US9659175B2 (en)Methods and apparatus for identifying and removing malicious applications
JP2023522269A (en) Machine learning system and method for reducing false positive malware detection rate
US8914889B2 (en)False alarm detection for malware scanning
WO2001084270A2 (en)Method and system for intrusion detection in a computer network
US20150096029A1 (en)Dynamic Selection and Loading of Anti-Malware Signatures
CN114615016A (en)Enterprise network security assessment method and device, mobile terminal and storage medium
US20250175476A1 (en)Systems and methods for prioritizing url review for sandboxing based on accelerated velocities of url features in network traffic
US7774451B1 (en)Method and apparatus for classifying reputation of files on a computer network
CN116881918B (en)Process safety detection protection method and device, electronic equipment and medium
EP3479279B1 (en)Dynamic ranking and presentation of endpoints based on age of symptoms and importance of the endpoint in the environment
US10742668B2 (en)Network attack pattern determination apparatus, determination method, and non-transitory computer readable storage medium thereof
US20240205254A1 (en)Supply chain attack detection
US7895654B1 (en)Efficient file scanning using secure listing of file modification times
CN114697057A (en)Method, device and storage medium for acquiring layout script information
US20250030729A1 (en)Security Incident Ranking and Ranking Explanation
US20040199913A1 (en)Associative memory model for operating system management
WO2025004174A1 (en)Attack analysis device, attack analysis method, and attack analysis program
WO2005114354A1 (en)Prioritizing intrusion detection logs

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:NETWORKS ASSOCIATES TECHNOLOGY, INC., CALIFORNIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:CAMBRIDGE, RODNEY D.;ALI, FEARUZ;REEL/FRAME:012031/0449

Effective date:20010720

ASAssignment

Owner name:MCAFEE, INC.,CALIFORNIA

Free format text:MERGER;ASSIGNOR:NETWORKS ASSOCIATES TECHNOLOGY, INC.;REEL/FRAME:016646/0513

Effective date:20041119

Owner name:MCAFEE, INC., CALIFORNIA

Free format text:MERGER;ASSIGNOR:NETWORKS ASSOCIATES TECHNOLOGY, INC.;REEL/FRAME:016646/0513

Effective date:20041119

STCFInformation on status: patent grant

Free format text:PATENTED CASE

FPAYFee payment

Year of fee payment:4

CCCertificate of correction
FEPPFee payment procedure

Free format text:PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Free format text:PAYER NUMBER DE-ASSIGNED (ORIGINAL EVENT CODE: RMPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

FPAYFee payment

Year of fee payment:8

FEPPFee payment procedure

Free format text:PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

ASAssignment

Owner name:MCAFEE, LLC, CALIFORNIA

Free format text:CHANGE OF NAME AND ENTITY CONVERSION;ASSIGNOR:MCAFEE, INC.;REEL/FRAME:043665/0918

Effective date:20161220

MAFPMaintenance fee payment

Free format text:PAYMENT OF MAINTENANCE FEE, 12TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1553)

Year of fee payment:12

ASAssignment

Owner name:JPMORGAN CHASE BANK, N.A., NEW YORK

Free format text:SECURITY INTEREST;ASSIGNOR:MCAFEE, LLC;REEL/FRAME:045055/0786

Effective date:20170929

Owner name:MORGAN STANLEY SENIOR FUNDING, INC., MARYLAND

Free format text:SECURITY INTEREST;ASSIGNOR:MCAFEE, LLC;REEL/FRAME:045056/0676

Effective date:20170929

ASAssignment

Owner name:MORGAN STANLEY SENIOR FUNDING, INC., MARYLAND

Free format text:CORRECTIVE ASSIGNMENT TO CORRECT THE REMOVE PATENT 6336186 PREVIOUSLY RECORDED ON REEL 045056 FRAME 0676. ASSIGNOR(S) HEREBY CONFIRMS THE SECURITY INTEREST;ASSIGNOR:MCAFEE, LLC;REEL/FRAME:054206/0593

Effective date:20170929

Owner name:JPMORGAN CHASE BANK, N.A., NEW YORK

Free format text:CORRECTIVE ASSIGNMENT TO CORRECT THE REMOVE PATENT 6336186 PREVIOUSLY RECORDED ON REEL 045055 FRAME 786. ASSIGNOR(S) HEREBY CONFIRMS THE SECURITY INTEREST;ASSIGNOR:MCAFEE, LLC;REEL/FRAME:055854/0047

Effective date:20170929

ASAssignment

Owner name:MCAFEE, LLC, CALIFORNIA

Free format text:RELEASE OF INTELLECTUAL PROPERTY COLLATERAL - REEL/FRAME 045055/0786;ASSIGNOR:JPMORGAN CHASE BANK, N.A., AS COLLATERAL AGENT;REEL/FRAME:054238/0001

Effective date:20201026

ASAssignment

Owner name:MCAFEE, LLC, CALIFORNIA

Free format text:RELEASE OF INTELLECTUAL PROPERTY COLLATERAL - REEL/FRAME 045056/0676;ASSIGNOR:MORGAN STANLEY SENIOR FUNDING, INC., AS COLLATERAL AGENT;REEL/FRAME:059354/0213

Effective date:20220301

ASAssignment

Owner name:JPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENT AND COLLATERAL AGENT, NEW YORK

Free format text:SECURITY INTEREST;ASSIGNOR:MCAFEE, LLC;REEL/FRAME:059354/0335

Effective date:20220301

ASAssignment

Owner name:JPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENT, NEW YORK

Free format text:CORRECTIVE ASSIGNMENT TO CORRECT THE THE PATENT TITLES AND REMOVE DUPLICATES IN THE SCHEDULE PREVIOUSLY RECORDED AT REEL: 059354 FRAME: 0335. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNMENT;ASSIGNOR:MCAFEE, LLC;REEL/FRAME:060792/0307

Effective date:20220301


[8]ページ先頭

©2009-2025 Movatter.jp